Sei sulla pagina 1di 7

International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084 Volume-3, Issue-4, April-2015

Qos PROVISIONING FOR MULTIMEDIA TRAFFIC ON MPLS VPN


WITH TRAFFIC ENGINEERING
1
LOGESH K, 2Dr. T.P. SARAVANABAVA
1
M.E SEOR, Ramanujan Computing Center, Anna University, Chennai 600 025
2
Professor, Ramanujan Computing Center, Anna University, Chennai 600 025
Email: 1logesh123@gmail.com, 2tpsbava@yahoo.co.uk

Abstract: Multi-Protocol Label Switching (MPLS) is considered as a good packet switching technology that
ensures the Quality of Service (QoS) useful for multimedia applications, reliability and efficient use of network
resources. Virtual Private Networks (VPNs) provide customers with predictable and secure network connections
over a shared network with the concern to address the QoS and security issues associated with deployment.
Hence the combination of VPN over MPLS will provision the QoS for the Multimedia traffic to the end
customers. We propose here the RSVP based resource reservation technique along with the MPLS-VPN
architecture to achieve better bandwidth utilization, low delay and packet drop. The Simulation Results have
shown the better performance of the proposed approach.

Keywords: Qos; MPLS; RSVP.

I. INTRODUCTION Each MPLS packet has a header. In a non ATM


environment, the header contains a 20-bit label, a 3-bit
1.1. MPLS Overview Experimental field (formerly known as Class of
Service, or CoS field), a 1-bit label stack indicator and
Multi-Protocol Label Switching (MPLS) is a an 8-bit TTL field. In a ATM environment, the header
protocol introduced as a synthesis of many ideas to contains only a label encoded in the VCI/VPI field.
form a fast and controllable structure in IP backbone. An MPLS capable router, termed Label Switching
MPLS is a high performance method used to transmit Router (LSR), examines the label and possibly the
packets over the network. The labels of MPLS which experimental field in forwarding the packet.
are short, which have fixed lengths and which can be Constraint Based Routing (CBR) computes routes
easily transmitted, make the promotion of IP packet that are subject to constraints such as bandwidth and
headers in easier way [1]. MPLS integrates a label administrative policy. Because Constraint Based
swapping framework with network layer routing. Its Routing considers more metrics than network
basic idea involves assigning short fixed length labels topology alone in computing routes, it may find a
to packets at the ingress to the MPLS cloud (based on longer but lightly loaded path better than heavily
the concept of forwarding equivalence classes) and loaded shortest path. Network traffic is hence
making forwarding decisions according to the labels distributed more evenly. Constraint Based Routing
attached to packets throughout the interior of the can be online or offline. With online Constraint Based
MPLS domain [2]. Routing, routers may compute paths for LSPs (Label
Switched Paths) at any time. With offline Constraint
1.2. MPLS Network Based Routing, an offline server computes paths for
LSP’s periodically (hourly / daily). LSPs are then
MPLS is a protocol-agnostic mechanism for configured to take the computed paths.
transporting data using either a connection oriented Online Constraint-based Routing will compute
approach (based on MPLS plus RSVP) or paths for the LSPs such that for every link, the
connectionless (IP/MPLS with LDP (Label maximum reservable bandwidth of the link is greater
Distribution Protocol)). MPLS has been standardized than or equal to the sum of the specified bandwidth of
by the IETF, and has been designed to carry both all LSPs traversing the link. Under this premise,
circuit and packet traffic over virtual circuits known as whether high utilization will occur in a link depends
LSPs (Label Switched Path). It makes forwarding on how close the total actual traffic rate of all the
decisions using labels that are added (and removed) by LSPs matches the total specified bandwidth, high
the MPLS routers. This means it can act as a single utilization may occur in the link [5].
transport mechanism for many different kind of 1.3. Traffic Engineering in MPLS Network
traffic. ATM, Ethernet, IP and TDM traffic can all be
carried, and can use connection oriented mechanisms Traffic Engineering (TE) is essential for
to ensure circuit-switched traffic can be delivered service provider backbone networks. Such backbones
across a packet core [15]. must support a high use of transmission capacity, and
the network must be very resilient, so that they can
withstand link or node failures. MPLS traffic

QOS Provisioning For Multimedia Traffic On MPLS VPN With Traffic Engineering

51
International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084 Volume-3, Issue-4, April-2015

engineering provides an integrated approach to traffic accepted into the network and to balance the traffic
engineering. With MPLS, traffic engineering load. During path computation, the key operation in
capabilities are integrated into Layer-3 (Network), DORA is to avoid routing over links that have (1)
which optimizes the routing to IP traffic, given the high potential to be part of any other path, and (2) low
constraints imposed by backbone capacity and residual bandwidth available.
topology
Rong Xu [9] have presented a novel
MPLS Traffic Engineering [4]: approach integrating recent advances in MPLS traffic
 Enhances standard IGPs, such as IS-IS or engineering with wavelength switch routing
OSPF, to automatically map packets onto technologies to achieve optical interconnect for IP-
the traffic flows centric data networks. New node architecture for
 Transports traffic flows across a network scalable wavelength label switching networks
using MPLS forwarding (WLSNet) is proposed, which supported label
 Determine the routes for traffic flows across switching and wavelength routing. Their research
a network based on the resources the traffic showed that network adds more flexible routing,
flow requires and the resources available in traffic engineering, and explicit routes via MPLS, is
the network. the best way to realize optical interconnects and to
 Employs “Constraint Based Routing” in reduce management complication and cost of
which the path for a traffic flow is the network. They have showed an approach to
shortest path that meets the resource dynamically interconnect routers via wavelength,
requirements (constraints) of the traffic including a bypass routing in the node, by this way
flow. In MPLS Traffic Engineering, the new wavelengths may easily be introduced to the
traffic flow has bandwidth requirements, network at a reasonable cost.
media requirements, a priority versus other
flow, and so on Nasser-Eddine Rikli, Saad Almogari [10]
 Recovers to link or node failures that change has done the simulation on the MPLS VPN network
the topology of the backbone by adapting to using NS2 with various queuing policies to evaluate
a new set of constraints [4]. the provisioning of the end to end QoS requirements
for multimedia traffic. After simulation, effect on the
II. RELATED WORK multimedia traffic QoS after the deployment of the
various queuing policies, merits / shortcomings has
been compared
Xipeng Xiao [5] has proposed a procedure for
deploying MPLS system. In their research they have
III. PROPOSED FRAMEWORK
discussed traffic engineering with Multi-Protocol
Label Switching in an Internet Service provider
3.1. Network Setup diagram for MPLS TE Model
network. They have reviewed MPLS, Constraint
based routing and enhanced link state Interior gateway
The network model for MPLS VPN considered for
protocols to provide background for traffic
simulation study is shown in the following diagram.
engineering and also they have discussed ways to
Below model indicates various types of routers. A
provide quality of service in a network with MPLS.
brief description on the functionality of those routers
Mingui Zhang [6] have formulated the traffic
is described below:
engineering problem as a Multi commodity flow
problem with hybrid MPLS/OSPF routing (MCFTE).
CE RTR – Customer Edge Routers – It will be
As a result, the majority of the traffic is routed by
located on the customer premises which provide an
regular OSPF, while only a small number of MPLS
interface between customer LAN / WAN and Service
tunnels are needed to fine-tune the traffic distribution.
provider’s network. In this model, 2 Nos. of Clients
It keeps OSPF link weights unchanged to avoid
and 2 Nos. of Servers are connected across the
triggering network convergence, and needs far fewer
network in the Customer’s side. In real time, many
MPLS tunnels than the full mesh to adjust traffic.
10/100/1000 Mbps Ethernet switches will be
Compared with existing hybrid routing approaches
connected to the CE RTRs. These routers may be
MCFTE achieves the optimal link utilization, runs
Non-MPLS router also.
about two orders of magnitude faster and is more
robust against measurement inaccuracy in traffic
LER – Label Edge Router – These are routers
demand.
which sits at the edge of the network also termed as
R. Boutaba [7] have proposed DORA, a dynamic
PE (Provider Edge) Routers. This forms the boundary
online routing algorithm for construction of
between the Customer’s Network and Service
bandwidth guaranteed paths in MPLS-enabled
Provider’s Network. MPLS label pushing (at ingress
networks. The main objective of DORA is to place
side) and poping (at egress side) will happen at these
paths with reserved bandwidth evenly across the
routers.
network in order to allow more future paths to be
QOS Provisioning For Multimedia Traffic On MPLS VPN With Traffic Engineering

52
International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084 Volume-3, Issue-4, April-2015

action. The resource reservation process, shown in


Fig.2 can be summarized as follows. When a Path
message is received at the ingress interface of the
LSR, the RSVP-TE agent performs admission control
and policing functions. If there are enough available
resources it forward the Path message to the
downstream LSR [13].
After admission control and policing operations
have been performed all along with LSP, a Resv
message is generated and forwarded upstream along
the LSP. An LSR, when processing a Resv message,
allocates resources and calls the resource manager to
properly configure the queues in the packet scheduler.
Fig. 1. Network Setup Diagram The scheduler used with the RSVP-TE module is the
Weighted Fair Queuing (WFQ), which is already
Provider (P) Routers – These routers are implemented in NS2. Moreover, the RSVP-TE agent
indicated as Site-1 to Site 5 in the below diagram. It calls the MPLS classifier to create the corresponding
should be noted that, in real time scenario multiple entries in the LIB (Label Information Base) and PFT
sites with CE routers shall connect to PE routers and (Partial forwarding Table) tables used for label
PE routers shall connect to other PE routers over P switching [13].
routers (core of the provider or carrier’s network) in
the real time backbone network RSVP-TE
Path Messages Resv Messages
The network model has been designed
considering the mesh topology connectivity between
the P routers. Efforts have been taken in the design to
LIB
make the simulation traffic which should match with
the real time scenario. Admission Resource
In NS2, we had taken the following traffic Control Manager
models which are equivalent to the real time
multimedia traffic. CBR (Constant Bit Rate) objects Policing
will generate the packets at a constant bit rate at MPLS Node
ERB
predefined packet size. Hence we had selected this
traffic as equivalent to data traffic. Exponential
objects generate ON/OFF Traffic. During ON
periods, packets are generated at constant burst rate.
Packet Schedul er WFQ
During OFF period,, no traffic is generated. Burst Link
times and idle times are taken from the exponential Fig. 2. Resource Reservation Process [13]
distribution. This kind of model resembles voice
traffic; hence we had selected this traffic as IV. RESULTS AND ANALYSIS
equivalent to voice. For Video Traffic, we had
implemented with the publicly available library of 4.1. RSVP-TE/ns Module [13]
traces of encoded (compressed) video. We had used
H.263 codec compressed file for the simulation. The below section explains the functionalities of
These traces have been generated from encodings of the RSVP TE simulator in the NS2 environment. In
several videos of typically 60 minutes length each. this section, the main functionalities of the RSVP-TE
module in the MPLS routers were described. The
3.2. RSVP based resource reservation in MPLS functionalities can be divided into two distinct sets.
VPN Architecture  LSP’s establishment
 LSP’s Teardown
In order to secure promised services, it is not
sufficient simply to select a route that can provide the 4.1.1 LSP’s establishment
correct resources. These resources must be reserved to
ensure that they are not shared or “stolen” by other In this LSP establishment phase, two different
LSP. The traffic requirements can be passed during commands are used. The first one is used when the
LSP setup (as with constrained based routing). They ingress LER wants to establish an ER-LSP, while the
are used at each LSR to reserve the resources required, second one is used when it wants to create an ER-LSP
or to fail the setup if the resources are not available. with the reserved bandwidth.
In order to support QoS, the developed module is <ingress-LSR>create-erlsp-rsvpte
also able to perform resource reservation for the LSP <egress-LSR><sessionID><FlowID>
itself. The RSVP-TE agent is responsible for this <TunnelID><er>

QOS Provisioning For Multimedia Traffic On MPLS VPN With Traffic Engineering

53
International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084 Volume-3, Issue-4, April-2015

link, a PathErr message upstream, so as to


<ingress-LSR>create-erbwlsp-rsvpte notify the ingress LER of the failure;
<egress-LSR><sessionID><FlowID>  The rsvp agent of the <downstream node>
<TunnelID><rate><bucket><ttl><er> sends, for each LSP that is established on the
broken link, a ResvErr message downstream,
In both the cases, the Path message sent by the so as to notify the egress LER of the failure;
ingress LER contains, in addition to the classical  The egress LSR, after processing each
RSVP objects, a LABEL_REQUEST object, used for ResvErr message, sends to the <downstream
requesting to the downstream nodes the allocation of node> a ResvTear message, in order to release
the labels. The simulator allows to create an LSP that the previously allocated resources;
follows an explicit path specifying <er> option a  The ingress LER, after processing each
sequence of nodes addresses. This field, if not empty, PathErr message, sends to the <upstream
is used to create an EXPLICIT_ROUTE_OBJECT node> a PathTear message, in order to release
(ERO), which is added to the Path message. the previously allocated resources;
 The ingress LER, deletes the corresponding
When an LSR receives a Path message, it entry in the LIB, PFT and ERB tables.
performs several operations; the first ones are related
to admission control and policing. Then the node After these operations, all the flows bound to an
processes the ERO: it inserts the ERO contents in the LSP that has been torn down are forwarded according
Path State Block (PSB) and then it looks for the next to a Layer 3 routing protocol. This allows applying
abstract node, to forward the Path message to. The different rerouting techniques.
insertion of the ERO value in the PSB is needed in 4.2. Simulation Section
order to assure that Resv messages follow, in the
upstream direction, the same route of the Path ones. We had created the MPLS VPN architecture in
Once the egress LER has received and processed the NS2 based on the proposed network setup model as
Path message, it generates a Resv message that shown in Fig.1. Implemented topology in NS2 has
contains, in the LABEL object, the label value to be shown in Fig.3.
used by the upstream node.
In this model, we had established the traffic path in
When an LSR receives a Resv message, the node the network with multiple sources. First, external
sets a new label value to be suggested to the upstream traffic has been established between the client and
node. Moreover, if the issued command is for an ER- server nodes. Further internal traffic has been created
LSP with bandwidth reservation, the LSR calls the among various sites to have multiple cumbersome
Resource manager which, in turn, executes the traffic paths which are normal in a real time backbone
resource allocation. network.
Subsequently, it passes the label contained in the Initially simulation has done without RSVP TE
Resv message (outgoing label) and the new label implementation i.e., with MPLS LDP, and then the
(incoming label) to the MPLS classifier, which uses same model has been simulated after RSVP-TE
them to create the corresponding entry in the label deployment. We have taken the metrics of bandwidth
switching tables. Finally, the LSR generates a Resv utilization, end-to end delay and packet loss ratio for
message, with a LABEL object containing the value evaluation. Methods of obtaining the results are
of the suggested label, and forwards it to the previous described below: Loss ratio is given by the ratio of
node as stores in the PSB. When the ingress LER average number of packets lost at the receivers to the
processes the Resv message the LSP is established. average number of packets sent. Average data
Another command may be used to bind a flow to the consumption is the bandwidth utilization during the
LSP. simulation time which has been calculated by
calculating the no. of packets received at both the
4.1.2 LSP’s Teardown sinks multiplied by the packet size. End to end delay
In this teardown phase, it allows a tear down an has been calculated by obtaining the average time
LSP when failure occurs. This command drives the taken by the data packets to reach the destination
simulation of a link failure. sinks. For all the three performance metrics, we had
<upstream node>break-link<downstream node> varied the data sending rate of each source and the
<ID downstream node><ID upstream node> results were obtained. Simulation parameters are listed
The following subsequent actions, related to in Table-1.
handling this event, are automatically performed. The results and comparison are described in
 The link between the <downstream node> and the next section.
<upstream node> fails;
 The rsvp agent of the <upstream node> sends,
for each LSP that is established on the broken

QOS Provisioning For Multimedia Traffic On MPLS VPN With Traffic Engineering

54
International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084 Volume-3, Issue-4, April-2015

Fig. 5 Data Sending Rate / Source Vs Packet Drop – CBR


Traffic
Fig. 3. Simulation Topology
Table-I Simulation Parameters
Description Parameters
Total No. of Routers 13 Nos.
Traffic Type CBR, Exponential, Video
512 Bytes (For CBR & Expo)
Packet Size
250 to 400 Bytes (For Video)
Rate / Source 1.5, 2, 2.5, 3 Mb
No. of flows 2,4,6 and 8
Link Bandwidth 12Mb Fig. 6 Data Sending Rate / Source Vs Avg Data Consumption –
Maximum Reserved CBR Traffic
99%
Bandwidth
Bottleneck Bandwidth 5Mb Fig. 4 to Fig.6 shows the results of delay,
packet drop and average data consumption by varying
Simulation Time 10 Secs
the rate from 1.5Mb/s to 3Mb/s for the CBR traffic in
4.3. Results Analysis RSVP and MPLS VPN protocols. When comparing
the performance of the two protocols, we infer that
In this section, the results are obtained by varying RSVP outperforms MPLS VPN by 32% in terms of
the data sending rate at each source node from 1.5 to 3 average data consumption, 59% in terms of delay and
Mb. The performance are measured considering each 31% in terms of packet drop.
traffic separately and combination of all the traffics
types. 4.3.2. Case-II – Exponential Traffic
Since RSVP allocates the resources as per the user
requirement and the path is selected as per the Below are the results of Exponential Traffic
allocated resources, the bandwidth utilization of the
users will tend to increase when compared to the
normal MPLS VPN architecture. Moreover, since it
chooses the optimum path, the packet drops will be
less and hence the end-to-end delay becomes less
when compared to the MPLS VPN. This fact can be
proved by the results described in the following
section.
4.3.1. Case-I - CBR Traffic

Below are the results of CBR Traffic. Fig. 7 Data Sending Rate / Source Vs Delay – Exponential
Traffic

Fig. 8 Data Sending Rate / Source Vs Drop – Exponential


Fig. 4 Data Sending Rate / Source Vs Delay – CBR Traffic Traffic

QOS Provisioning For Multimedia Traffic On MPLS VPN With Traffic Engineering

55
International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084 Volume-3, Issue-4, April-2015

Fig. 10 to Fig.12 shows the results of delay,


packet drop and average data consumption by varying
the packet size from 250 bytes to 400 bytes for video
traffic in RSVP and MPLS VPN protocols. When
comparing the performance of two protocols, we infer
that RSVP outperforms MPLS VPN by 15% in terms
of average data consumption, 82% in terms of delay
and 94% in terms of packet drop.
4.3.4. Case-IV –Combined Traffic

Fig. 9 Data Sending Rate / Source Vs Avg Data Consumption –


In the combined scenario, we had assigned the
Exponential Traffic traffic flows randomly with CBR, Exponential and
Video Flows used to analysis the metrics of delay,
Fig.7 to Fig.9 shows the results of delay, packet drop and average data consumption. The
packet drop and average data consumption by varying results are compared and indicated below.
the rate from 1.5Mb/s to 3Mb/s for the Exponential
traffic in RSVP and MPLS VPN protocols. When
comparing the performance of the two protocols, we
infer that RSVP outperforms MPLS VPN by 32% in
terms of bandwidth, 58% in terms of delay and 30%
in terms of packet drop

4.3.3. Case-III –Video Traffic

Below are the results of Video Traffic


Fig.13 Data Sending Rate / Source Vs Delay – Combined
Traffic

Fig.10 Packet Size / Source Vs Delay – Video Traffic

Fig.14 Data Sending Rate / Source Vs Drop – Combined


Traffic

Fig.11 Packet Size / Source Vs Drop – Video Traffic

Fig.15 Data Sending Rate / Source Vs Avg Data consumption–


Combined Traffic

Fig. 13 to Fig. 15 shows the results of delay,


packet drop and average data consumption by varying
Fig.12 Packet Size / Source Vs Avg Data consumption– Video the rate from 1.5Mb/s to 3Mb/s for the combined
Traffic traffic in the RSVP and MPLSVPN protocols. When

QOS Provisioning For Multimedia Traffic On MPLS VPN With Traffic Engineering

56
International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084 Volume-3, Issue-4, April-2015

comparing the performance of the two protocols, we [4] “MPLS Traffic Engineering”, Cisco IOS release 12.0(8)S
[5] Xipeng Xiao, Alan Hannan, Brook Bailey and Lionel M. Ni,
infer that RSVP outperforms MPLSVPN by 66% in
“Traffic Engineering with MPLS in the Internet”, Network
terms of average data consumption and 22% in terms IEEE, Volume:14, Issue:2, page 28-33, 2000.
of delay and 10% of packet drop.
[6] Mingui Zhang, Bin Liu and Beichuan Zhang, “Multi-
Commodity Flow Traffic Engineering with Hybrid
CONCLUSIONS MPLS/OSPF Routing” , GLOBECOM, page 1-6, 2009.
[7] R. Boutaba, W. Szeto and Y. Iraqi, “DORA: Efficient
The QoS is an important consideration in MPLS Routing for MPLS Traffic Engineering” , Journal of Network
and Systems Management, Vol. 10, No. 3, September 2002.
network. In our proposed method, the MPLS VPN [8] Bernard Fortz, Jennifer Rexford and Mikkel Thorup, “Traffic
architecture is combined with the Traffic Engineering. EngineeringWith Traditional IP Routing Protocols”, IEEE
This improves the performance metrics such as packet Communication Magazine, October 2002.
delay, jitter and packet. RSVP allocates the resources [9] Rong Xu, YueFeng Ji, Qian Gong and Peida Ye, “A New
Node Architecture for Scalable Wavelength Label Switching
as per the user requirement and the path is selected as Networks Using MPLS”, 2”d IEEE International Conference
per the allocated resources, hence the bandwidth on Microwave and Millimeter Wave Technology
utilization of the users will tend to increase when Proceedings, 2000.
compared to the normal MPLS VPN architecture. [10] Nasser-Eddine Rikli and Saad Almogari, “Efficient priority
schemes for the provision of end-to-end quality of service for
Moreover, since it chooses the optimum path, the multimedia traffic over MPLS VPN networks”, Journal of
packet drops will be less and hence the end-to-end King Saud University – Computer and Information Sciences
delay becomes less when compared to the MPLS ,25, 89–98, 2013.
VPN. The simulation results also showed the better [11] Balazs Szviatovszki, Aron Szentesi and Alpar Juttner,
“Minimizing Re-Routing in MPLS Networks with
performance improvements in the performance Preemption-Aware Constraint-Based Routing”, Computer
metrics for proposed RSVP based architecture. Communications 25(11-12) 1076-1084 ,2002.
[12] Paul Brittain and Adrian Farrel, "MPLS Traffic Engineering-
REFERENCES AChoice of Signaling Protocols", MetaSwitch Networks,First
issued January 2000.
[13] D. Adami, C. Callegari, S. Giordano, F. Mustacchio, M.
[1] O. Gure, B.K Boyaci and N.O. Unverdi “Analysis of the Pagano and F. Vitucci, “Overview of the RSVP-TE Network
Service Quality on MPLS Networks”, 5th European Simulator: Design and Implementation”, Proceedings of
Conference on Circuits and Systems for Communications Internet Performance, Simulation, Monitoring and
(ECCSC’10), Belgrade, Serbia, November 23-25 2010. Measurements (IPS-MOME), 276-281, 2005.
[2] Peng Zhang and Raimo Kantola, “Building MPLS VPNs with [14] Joel Repiquet, “A Whitepaper on Simulating Classes of
QoS Routing Capability”, INTERWORKING, 292-301, Services over an IP/MPLS backbone, VPN case study”, delve
2000. intoTech, 2005.
[3] Rozita Yunos, Siti Arpah Ahmad, Noorhayati Mohamed [15] MPLS-TP and IP/MPLS – their applicability for metro
Noor, Raihana Md Saidi and Zarina Zainol, “Analysis of networks by Innovation observatory Ltd, Silvaco Technology
Routing Protocols of VoIP VPN over MPLS Network”. IEEE Centre, http://www.innovationobservatory.com
Conference on Systems, Process & Controls (ICSPC2013), [16] Network Simulator: http:///www.isi.edu/nsnam/ns
Kuala Lumpur, Malaysia 13-15 December 2013.



QOS Provisioning For Multimedia Traffic On MPLS VPN With Traffic Engineering

57

Potrebbero piacerti anche